Linux Security Advice

Linux Security Documents

Showing 1 to 20 of 20

Project Part 1 Task 1: Outline Security Policy
First World Bank Savings and Loan Need
Based on the desired functionality listed by the senior management at First
World Bank Savings and Loan, a database server, Web server, file server, Simple Mail
Transfer

PCI DSS Compliance Checklist
Here are the 12 primary requirements of the PCI DSS :
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
Requirement 2: Do not use vendor-supplied defaults for system passwords and other se

Project Part 1
Task 1: Online Security Policy
Jason Anderson
The First World Bank Savings and Loan needs a network solution using Linux to
support online banking services. This move to online services using Linux will save the
bank money by moving from ex

Project Part 1
Task 2: Provide Open Source Server solutions
Jason Anderson
When considering Open Source server solutions to meet the needs of the new online
banking transaction environment there are many to choose from. I think however for
this it may be

Project Part 1
Task 3: Manage User Account Access
Jason Anderson
As far as managing user accounts to make sure everyone has the access they need
and no more access than necessary, you need to have a solid access policy in place.
First the Web administrato

Project Part 2
Task 3 Provide Layered Security
Jason Anderson
To allow the administrators SSH access to the web server, would normally open up the server to
unwanted and potentially destructive access from hackers and the like. TCP wrappers can be
configu

Questions:
1. GRUB is a bootloader that allows for multi-OS or booting to different kernel
configurations.
2. Sudo is used to give limited su access without using them complete su access- the
sudo user is configurable and auditable for tracking activity.

Project Part 4 Task 1: Design a Backup Plan
Even with the best security available, things can go horribly wrong for any
company when it comes to servers, applications, and networks. A cracker might gain
root access and begin systematically invading the se

Project Part 3 Task 1: Use a Kernel
Kernels are the brains of Linux, the nerve center of how the operating system
functions. It is responsible for telling the CPU how to access hardware and process
driver information, and how processes requested from soft

Project Part 2 Task 1: Secure File Storage Server
File Storage Server Security:
First World Bank Savings and Loan will need a file storage server that is both secure
and accessible by the Web server in the course of transactions to be conducted by the
Web

Lab 4 Screenshots
Jason Anderson
Questions:
1. Permissions of the parent folder may be overriding the permissions on that file.
2. I would use the ro mounting option to set the mounted file system read only.
3. Run edquota <user> and edit the hard limit t

Questions:
1. You can give permissions/access to groups then add many users to these groups.
2. Create a group for db admins then differentiate each of the five administrators so that
you will know what each of them does.
3. su c chage d 0 <admin account

Week 6 Discussion
Determining Firewall Rules
Jason Anderson
First of all I would set the bastion host to only allow ports 20, 22, 80, and 443 for File Trasnfer
Protocol(20) and Secure Shell(22) and Web applications on (80,443) activities from the
192.168.